Menu

Blog

Page 5776

Dec 17, 2020

World’s Fastest Motorcycle is Solar Powered

Posted by in categories: solar power, sustainability, transportation

The Lightening SuperBike is the fastest production motorcycle in the world, clocking in at 218 MPH. (There are faster bikes, but none of them are street legal.) It recently won the Pikes Peak International Hill Climb, beating all competitors, including gasoline-powered bikes. But don’t ask how many cylinders its engine has — this bike is solar powered. Well technically it’s battery-powered, but it charges the batteries with solar energy.

Image: SMA America

Continue reading “World’s Fastest Motorcycle is Solar Powered” »

Dec 17, 2020

Quantum computational advantage using photons

Posted by in categories: particle physics, quantum physics, supercomputing

Quantum computational advantage or supremacy is a long-anticipated milestone toward practical quantum computers. Recent work claimed to have reached this point, but subsequent work managed to speed up the classical simulation and pointed toward a sample size–dependent loophole. Quantum computational advantage, rather than being a one-shot experimental proof, will be the result of a long-term competition between quantum devices and classical simulation. Zhong et al. sent 50 indistinguishable single-mode squeezed states into a 100-mode ultralow-loss interferometer and sampled the output using 100 high-efficiency single-photon detectors. By obtaining up to 76-photon coincidence, yielding a state space dimension of about 1030, they measured a sampling rate that is about 1014-fold faster than using state-of-the-art classical simulation strategies and supercomputers.

Science, this issue p. 1460

Quantum computers promise to perform certain tasks that are believed to be intractable to classical computers. Boson sampling is such a task and is considered a strong candidate to demonstrate the quantum computational advantage. We performed Gaussian boson sampling by sending 50 indistinguishable single-mode squeezed states into a 100-mode ultralow-loss interferometer with full connectivity and random matrix—the whole optical setup is phase-locked—and sampling the output using 100 high-efficiency single-photon detectors. The obtained samples were validated against plausible hypotheses exploiting thermal states, distinguishable photons, and uniform distribution. The photonic quantum computer, Jiuzhang, generates up to 76 output photon clicks, which yields an output state-space dimension of 1030 and a sampling rate that is faster than using the state-of-the-art simulation strategy and supercomputers by a factor of ~1014.

Dec 17, 2020

Scientists think they’ve detected radio emissions from an alien world

Posted by in category: space

Similar findings may tell scientists about magnetic fields around exoplanets.


Scientists may have detected radio emissions from a planet orbiting a star beyond our sun for the first time.

The astronomers behind the new research used a radio telescope in the Netherlands to study three different stars known to host exoplanets. The researchers compared what they saw to observations of Jupiter, diluted as if being seen from a star system dozens of light-years away. And one star system stood out: Tau Boötes, which contains at least one exoplanet. If the detection holds up, it could open the door to better understanding the magnetic fields of exoplanets and therefore the exoplanets themselves, the researchers hope.

Dec 17, 2020

Nuclear weapons agency breached amid massive cyber onslaught

Posted by in category: military

The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.

On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation at NNSA, and the Richland Field Office of the DOE.

Dec 17, 2020

Floating ‘mini-nukes’ could power countries by 2025, says startup

Posted by in category: nuclear energy

Danish company plans to fit ships with small nuclear reactors to send energy to developing countries.

Dec 17, 2020

The batteries that could make fossil fuels obsolete

Posted by in categories: energy, sustainability

The advent of “big battery” technology addresses a key challenge for green energy – the intermittency of wind and solar.

Dec 17, 2020

Translation Or Biosynthesis Of Proteins

Posted by in category: futurism

This video explains translation or biosynthesis of proteins.

Thank You For Watching.
Please Like And Subscribe to Our Channel: https://www.youtube.com/EasyPeasyLearning.
Like Our Facebook Page: https://www.facebook.com/learningeasypeasy/
Join Our Facebook Group: https://www.facebook.com/groups/460057834950033

Dec 17, 2020

China’s quantum computer a step, not a leap

Posted by in categories: quantum physics, supercomputing

On December 3, Science magazine published a scientific paper by Chinese scientists on the results of experiments with a prototype quantum computer.

It was widely reported in the media that the Chinese system needed only 200 seconds to carry out a computation that would take over two billion years using the fastest supercomputer existing today.

The experiments were designed and carried out by a top-level research group led by Pan Jianwei and Lu Chaoyang of the University of Science and Technology in Hefei, China. Pan is one of the most famous Chinese physicists today, referred to once in Nature magazine as the “Father of the Quantum.”

Dec 17, 2020

Three-party quantum private computation of cardinalities of set intersection and union based on GHZ states

Posted by in categories: computing, encryption, quantum physics, security

Quantum key distribution is one kind of important cryptographic protocols based on quantum mechanics, in which any outside eavesdropper attempting to obtain the secret key shared by two users will be detected. The successful detection comes from Heisenberg’s uncertainty principle: the measurement of a quantum system, which is required to obtain information of that system, will generally disturb it. The disturbances provide two users with the information that there exists an outside eavesdropper, and they can therefore abort the communication. Nowadays, most people need to share some of their private information for certain services such as products recommendation for online shopping and collaborations between two companies depending on their comm interests. Private Set Intersection Cardinality (PSI-CA) and Private Set Union Cardinality (PSU-CA), which are two primitives in cryptography, involve two or more users who intend to obtain the cardinalities of the intersection and the union of their private sets through the minimum information disclosure of their sets1,2,3.

The definition of Private Set Intersection (PSI), also called Private Matching (PM), was proposed by Freedman4. They employed balanced hashing and homomorphic encryption to design two PSI protocols and also investigated some variants of PSI. In 2012, Cristofaro et al.1 developed several PSI-CA and PSU-CA protocols with linear computation and communication complexity based on the Diffie-Hellman key exchange which blinds the private information. Their protocols were the most efficient compared with the previous classical related ones. There are also other classical PSI-CA or PSU-CA protocols5,6,7,8. Nevertheless, the security of these protocols relies on the unproven difficulty assumptions, such as discrete logarithm, factoring, and quadratic residues assumptions, which will be insecure when quantum computers are available9,10,11.

For the sake of improving the security of PSI-CA protocols for two parties, Shi et al.3 designed a probabilistic protocol where multi-qubit entangled states, complicated oracle operators, and measurements in high N-dimensional Hilbert space were utilized. And the same method in Ref.3 was later used to develop a PSI-CA protocol for multiple parties12. For easy implementation of a protocol, Shi et al.13 leveraged Bell states to construct another protocol for PSI-CA and PSU-CA problems that was more practical than that in Ref.3. In both protocols Ref.3 and Ref.13, only two parties who intend to get the cardinalities of the intersection and the union of their private sets are involved. Although Ref.12 works for multiple parties, it only solves the PSI-CA problem and requires multi-qubit entangled states, complicated oracle operators, and measurements. It then interests us that how we could design a more practical protocol for multiple parties to simultaneously solve PSI-CA and PSU-CA problems. Inspired by Shi et al.’s work, we are thus trying to design a three-party protocol to solve PSI-CA and PSU-CA problems, where every two and three parties can obtain the cardinalities of the intersection and the union of their respective private sets with the aid of a semi-honest third party (TP). TP is semi-honest means that he loyally executes the protocol, makes a note of all the intermediate results, and might desire to take other parties’ private information, but he cannot collude with dishonest parties. We then give a detailed analysis of the presented protocol’s security. Besides, the influence of six typical kinds of Markovian noise on our protocol is also analyzed.

Dec 17, 2020

Mobile Protected Firepower: The U.S. Army’s New Light Tank

Posted by in categories: biotech/medical, innovation

In a press release, the U.S. Army announced that initial Mobile Protected Firepower (MPF) prototypes arrived at Fort Bragg, North Carolina. The preproduction MPF vehicles will be put through their paces by paratroopers from the Army’s 82 Airborne.

“We are incredibly excited to see the MPF platform entering into this phase,” an Army Ground Combat Systems official stated, explaining that the “MPF represents an innovative and aggressive approach to system acquisition. The beginning of our SVA (soldier vehicle assessment) in January illustrates how hard the teams are working to keep the major events of this program on schedule,” despite the ongoing pandemic.

The Army awarded two initial prototyping contracts to both BAE Systems and General Dynamics back in 2018. The contracts, worth $376 million each, covered a total of 504 final production Mobile Protected Firepower vehicles, with initial deliveries scheduled for 2025.